Thursday, September 10, 2009

Security textbooks

Books 2 Byte
Mark Stamp’s Information Security
Deven N. Shah
( http://www.wileyindia.com/)

Restricting access

If your application is on the enterprise’s Intranet, configure it to use Windows integrated security, advises Deven N. Shah in Mark Stamp’s Information Security: Principles and practice. That way, he says, the user’s logon credentials can be used for accessing resources.

More

No comments: